Impact
An improper control over the filename used in PHP include/require statements allows an attacker to include unintended local files. This Local File Inclusion vulnerability can lead to the execution of arbitrary PHP code, potentially providing full control over the affected system. The weakness is identified as CWE‑98, indicating unsafe inclusion of files based on user-controlled input.
Affected Systems
The vulnerability affects the WordPress Moments theme provided by Select‑Themes, with all releases up to and including version 2.2 vulnerable. No other products or versions are listed as affected.
Risk and Exploitability
The CVSS score of 8.1 reflects a high severity, while an EPSS score of less than 1% indicates a low probability of widespread exploitation at present. The vulnerability is not listed in the CISA KEV catalog. Attackers can likely exploit it by manipulating query parameters or other input that determines the included file path, and only minimal configuration changes on the server are required to defend against it.
OpenCVE Enrichment